Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.2262 php5 security update 28 August 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: php5 Publisher: Debian Operating System: Debian GNU/Linux 7 Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Modify Arbitrary Files -- Remote/Unauthenticated Overwrite Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-5590 CVE-2015-5589 CVE-2015-4644 CVE-2015-4643 CVE-2015-4598 Reference: ESB-2015.1819 ESB-2015.1818 ESB-2015.1656 ESB-2015.1625 Original Bulletin: http://www.debian.org/security/2015/dsa-3344 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3344-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond August 27, 2015 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : php5 CVE ID : CVE-2015-4598 CVE-2015-4643 CVE-2015-4644 CVE-2015-5589 CVE-2015-5590 Multiple vulnerabilities have been discovered in the PHP language: CVE-2015-4598 thoger at redhat dot com discovered that paths containing a NUL character were improperly handled, thus allowing an attacker to manipulate unexpected files on the server. CVE-2015-4643 Max Spelsberg discovered an integer overflow flaw leading to a heap-based buffer overflow in PHP's FTP extension, when parsing listings in FTP server responses. This could lead to a a crash or execution of arbitrary code. CVE-2015-4644 A denial of service through a crash could be caused by a segfault in the php_pgsql_meta_data function. CVE-2015-5589 kwrnel at hotmail dot com discovered that PHP could crash when processing an invalid phar file, thus leading to a denial of service. CVE-2015-5590 jared at enhancesoft dot com discovered a buffer overflow in the phar_fix_filepath function, that could causes a crash or execution of arbitrary code. Additionally, several other vulnerabilites were fixed: sean dot heelan at gmail dot com discovered a problem in the unserialization of some items, that could lead to arbitrary code execution. stewie at mail dot ru discovered that the phar extension improperly handled zip archives with relative paths, which would allow an attacker to overwrite files outside of the destination directory. taoguangchen at icloud dot com discovered several use-after-free vulnerabilities that could lead to arbitrary code execution. For the oldstable distribution (wheezy), these problems have been fixed in version 5.4.44-0+deb7u1. For the stable distribution (jessie), these problems have been fixed in version 5.6.12+dfsg-0+deb8u1. For the unstable distribution (sid), these problems have been fixed in version 5.6.12+dfsg-1. We recommend that you upgrade your php5 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCgAGBQJV3t20AAoJEBC+iYPz1Z1kPWgIAKa4oEs0lHk2z/kWhdbPodRR i5QpFWjxD0MMC7ey8MZ2zyQFmC/YMnWtlxG98L4EBrMM9hgoWt/ZP1+WNANKX/4n nhtb587OxTNjjIDZ/tu81419HubGzsy5eqKA880KZqIGLBRNC0KBTe2SuEZxA/oG lJqWHFktUQfC6Z2JJwUe8Yy1nrxUsd/P/5y5igGoRrFNiskUoE0KsPLcqAXmxSp4 h4qJ+9MjlvnHJocYTBOdJOn9Sob3kviORO+5zXcE+UOTtdkSlWLykXkzSykM9g9d a2nu6CPYZN9UO3BsLT2SBJ/LOdTZXSoPjXsUK5SyxqXpgAp/XVJrJZJBH77xBv8= =QjTz - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVd+8z36ZAP0PgtI9AQJJEQ//cs80T8On8zpU5sqaFElp4V/rLoiIhnKh G+rWJfyamuYRDFlSehEhKOZ98BlA3tJI7E+lbk70Ns7MQolbJtLaun5v6VO5nke7 axnv9vbIkRDvhFRyyE7rtEaNM3+qErZBnD5vr77JXjPpCNDR+qP3ln4+v3OqcKa4 pv3qazhh1q6l92alK35n7CKGEGsl2sJ9cPXYAby+5hCeybF4PQq5aC9eXcFYDHCW qvBCQ4bWJFX0tK9GBUOvmzwVGZbd2F8vQp/AeBvTFFfG/T42kyH0DAT3k4Os0olu 2/0/ULSmmlnxFZEi/BWvHnl0wfT5Jr0yBkmhO9VqOswZAfnrLZ+FmR9qDcVdy+HR K+4/o2Z9NOnU0jA7eAAdwW9F2CuxBOUMqZ5Li1j5zipHLGdetzICjaENOM3D3xZM LxShBuVYWJb/KD7V0ZISoQKlQNou0O4SzP/HwQYE4pw63rX8WawB87hvPau+zHz5 nn3Z/jwDbONGjAZK/3KLMTDqqi74tp6VPBSAPSJooni59WK2clRRreuznnmlzaUi k91fEZ1/XqUpAVMLh823CTeriwqM2jWgOB+/pXt6EXtQXvPTI87dLCqfAmgwQKhW OocBty0FvEfaOWLmXJiPvWbvzmLjPaclzOy9tVEXFAHouAcdqh1h2yXqvGyV6M3Q kXSsNUjAr1c= =RQpB -----END PGP SIGNATURE-----